0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (3)
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Together in Mission - From All Nations to All Nations (Paperback, New edition): David Harley, Ms Rosemary Harley Together in Mission - From All Nations to All Nations (Paperback, New edition)
David Harley, Ms Rosemary Harley
R283 R231 Discovery Miles 2 310 Save R52 (18%) Ships in 9 - 15 working days

Have you ever felt the call of God to go into all the world? David and Rosemary Harley did, and through simple obedience to that call they were able to have a worldwide impact on the spread of the Gospel. Together in Mission tells their story of leaving the UK to become full-time missionaries in Africa, and via several unexpected events helping to run All Nations College and latterly lead OMF International. Their story is in many ways a remarkable one, but the heart of this book is to inspire anyone and everyone to answer the call of God on their lives and see where it might lead them. It also highlights the continued need for the global Church to work together for the sake of the gospel.

OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,422 R1,330 Discovery Miles 13 300 Save R92 (6%) Ships in 12 - 17 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

The Vanes Of Shrewsbury (Paperback): Eddie Parker The Vanes Of Shrewsbury (Paperback)
Eddie Parker; David Harley
R158 Discovery Miles 1 580 Ships in 10 - 15 working days
The Vanes of Shrewsbury - Shrewsbury Drawings by Eddie Parker - Colour Edition (Paperback): Eddie Parker The Vanes of Shrewsbury - Shrewsbury Drawings by Eddie Parker - Colour Edition (Paperback)
Eddie Parker; David Harley
R238 Discovery Miles 2 380 Ships in 10 - 15 working days
By Law and Love - When God builds a new society (Paperback): David Harley By Law and Love - When God builds a new society (Paperback)
David Harley
R337 R284 Discovery Miles 2 840 Save R53 (16%) Ships in 10 - 15 working days
Sidetracked (Paperback): David Harley Sidetracked (Paperback)
David Harley
R342 Discovery Miles 3 420 Ships in 10 - 15 working days
AVIEN Malware Defense Guide for the Enterprise (Paperback): David Harley AVIEN Malware Defense Guide for the Enterprise (Paperback)
David Harley; Foreword by Robert S Vibert; Contributions by Ken Bechtel, Michael Blanchard, Henk K. Diemer, …
R2,154 Discovery Miles 21 540 Ships in 10 - 15 working days

Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you.
AVIEN's sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators of AVIEN who use those technologies in real life. This new book uniquely combines the knowledge of these two groups of experts. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature.
* "Customer Power" takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It then considers the roles of the independent researcher, the vendor-employed specialist, and the corporate security specialist.
* "Stalkers on Your Desktop" considers the thorny issue of malware nomenclature and then takes a brief historical look at how we got here, before expanding on some of the malware-related problems we face today.
* "A Tangled Web" discusses threats and countermeasures in the context of the World Wide Web.
* "Big Bad Bots" tackles bots and botnets, arguably Public Cyber-Enemy Number One.
* "Creme de la CyberCrime" takes readers into the underworld ofold-school virus writing, criminal business models, and predicting future malware hotspots.
* "Defense in Depth" takes a broad look at DiD in the enterprise, and looks at some specific tools and technologies.
* "Perilous Outsorcery" offers sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few horrible examples of how not to do it.
* "Education in Education" offers some insights into user education from an educationalist's perspective, and looks at various aspects of security in schools and other educational establishments.
* "DIY Malware Analysis" is a hands-on, hands-dirty approach to security management, considering malware analysis and forensics techniques and tools.
* "Antivirus Evaluation & Testing" continues the D-I-Y theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software.
* "AVIEN & AVIEWS: the Future" looks at future developments in AVIEN and AVIEWS.
.

Botnets - The Killer Web Applications (Paperback): Craig Schiller, James R Binkley Botnets - The Killer Web Applications (Paperback)
Craig Schiller, James R Binkley; Contributions by Anthony Bradley, Michael Cross, Gadi Evron, …
R1,749 Discovery Miles 17 490 Ships in 10 - 15 working days

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.
* This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise
* Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself

Preparing to Serve - Training for Cross-Cultural Mission (Paperback): C. David Harley, David Harley Preparing to Serve - Training for Cross-Cultural Mission (Paperback)
C. David Harley, David Harley
R414 Discovery Miles 4 140 Ships in 10 - 15 working days

The author's study of missionary training has taken him all over the world. In this work, he shares lessons learned from both Western and non-Western missionary training regarding training, clear objectives, getting started, the profile of a trainer, selecting trainees, the marks of effective training, holistic equipping, contextualized curriculum, and careful assessment of the entire training process.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Archaeology of the Teufelsberg…
Wayne D. Cocroft, John Schofield Paperback R674 Discovery Miles 6 740
Westminster - II. The Art, Architecture…
Warwick Rodwell, Tim Tatton-Brown Paperback R1,247 Discovery Miles 12 470
A Dictionary of Ancient Near Eastern…
Gwendolyn Leick Hardcover R6,394 Discovery Miles 63 940
Numismatic Archaeology of North America…
Marjorie H Akin, James C Bard, … Paperback R1,868 Discovery Miles 18 680
Cyrus the Great - A Biography of…
Lynette Mitchell Hardcover R3,759 Discovery Miles 37 590
The Lost City of the Monkey God
Douglas Preston Paperback R314 R257 Discovery Miles 2 570
The Sacred Identity of Ephesos…
Guy MacLean Rogers Hardcover R4,573 Discovery Miles 45 730
The Origins of Open Field Agriculture
Trevor Rowley Paperback R978 Discovery Miles 9 780
Protecting Catalhoeyuk - Memoir of an…
Sadrettin Dural Paperback R1,187 Discovery Miles 11 870
Archaeology, Economy, and Society…
David A. Hinton Paperback R1,199 Discovery Miles 11 990

 

Partners